www.kuppingercole.com
Open in
urlscan Pro
2606:4700:3108::ac42:2b51
Public Scan
Submitted URL: https://email.iam-excellence.com/e3t/Ctc/2K+113/cCP9x04/MWRsF5BVTVbW38Zgcy4hM0vCW9fbdmV56pM5XN7FnD0b5nR32W50kH_H6lZ3lrW7fXlG42rBr...
Effective URL: https://www.kuppingercole.com/events/2023/12/mastering-global-iam?utm_campaign=IAM%20Insights%20%E2%80%93%20Marketing%20Newsle...
Submission: On November 29 via api from ES — Scanned from ES
Effective URL: https://www.kuppingercole.com/events/2023/12/mastering-global-iam?utm_campaign=IAM%20Insights%20%E2%80%93%20Marketing%20Newsle...
Submission: On November 29 via api from ES — Scanned from ES
Form analysis
0 forms found in the DOMText Content
Go to Market with KuppingerCole Insights Research Advisory Events KC Open Select Company Become a Client Login Search Become a Client Insights Customer Identity & Access Management Decentralized Identity Fraud Prevention Identity & Access Management Identity Governance and Administration Passwordless Authentication Privileged Access Management Zero Trust Research Leadership Compass Whitepaper Executive View Advisory Note Leadership Brief Blog Videos Advisory Advisory Services Meet our Advisors Events EIC 2024 cyberevolution Webinars KC Open Select Managed Detection and Response Data Leakage Prevention Unified Endpoint Management Fraud Reduction Intelligence Platforms Identity Governance & Administration Customer Identity and Access Management Privileged Access Management Passwordless Authentication Company About us People Jobs Newsroom Cybersecurity Council Contact us Go to Market with KuppingerCole Insights Customer Identity & Access Management Decentralized Identity Fraud Prevention Identity & Access Management Identity Governance and Administration Passwordless Authentication Privileged Access Management Zero Trust See all insights Most recent in Customer Identity & Access Management Open Select Customer Identity and Access Management Create a shortlist of solutions tailored to your CIAM needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors directly. Executive View ForgeRock Workforce Identity Governance This KuppingerCole Executive View report looks at the ForgeRock Workforce Identity Governance solution, which combines enterprise identity governance with access management to manage the complete identity lifecycle within a single platform. Blog The Ping/ForgeRock combination A couple of months ago, the series of acquisitions of SailPoint, ForgeRock, and Ping Identity by Thoma Bravo triggered discussions and rumors about the impact on the broader Identity & Access Management (IAM) market. Recently, Thoma Bravo announced that ForgeRock would be combined into Ping Most recent in Decentralized Identity Event Recording Beyond Centralization: Enhancing Cybersecurity with Decentralized ID In his talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the concepts behind Decentralized ID and its current state. Based on that introduction, he will share his perspectives on how Decentralized IDs can improve the cybersecurity posture of organizations for Advisory Note How Enterprises Will Learn to Love Decentralized IDs: The Roles of Distributed and Sovereign Identities in Our Private Metaverse Recently, Meta CEO Mark Zuckerberg demonstrated in captivating detail a working beta version of photorealistic—or rather, video realistic—avatars in the metaverse. Zuckerberg also claims that this technology will begin rolling out this year (2023) and will be at a consumer price point by the end of Blog Securing the Digital Universe: Where Do We Even Start? What a huge topic. The Digital Universe. Is this more than the Metaverse or less? Anyway: We live in the Digital Age. The vast majority of organizations rely on digital services to run at least parts of their business. Every one of us is consuming such digital services. They are ubiquitous. But Most recent in Fraud Prevention Open Select Fraud Reduction Intelligence Platforms The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally. Blog Challenging the Easy Path: Why NIS2 Demands a New Compliance Mindset The enforcement of NIS2 is marked by firm oversight and significant sanctioning power. Supervisory bodies are designated at the national level to monitor and enforce compliance. Webinar Recording Are You Prepared for the True AD Disaster? In this webinar, we will look at Disaster Recovery planned right and done right – preparation is key to success The central role of directory services for the entire IT Events triggering the need for directory services DR Planning for directory services / Microsoft AD DR: How Most recent in Identity & Access Management Event Recording The Next Generation of Secure Access with Zero Trust Learn how Netskope can deliver a seamless transition for implementing the next generation of Zero Trust protection with their award-winning SSE platform. Blog The Ping/ForgeRock combination A couple of months ago, the series of acquisitions of SailPoint, ForgeRock, and Ping Identity by Thoma Bravo triggered discussions and rumors about the impact on the broader Identity & Access Management (IAM) market. Recently, Thoma Bravo announced that ForgeRock would be combined into Ping Whitepaper A Shift Toward MSP Delivery: How MSPs Are Mitigating Enterprise IAM Delivery Challenges Organizations face challenges in enterprise IAM delivery, including a shortage of experts, budget constraints, and difficulties in keeping up with industry changes. Fluctuations in IAM engagement lead to stress and reduced productivity. Insufficient transparency and prioritization cause financial Most recent in Identity Governance and Administration Open Select Identity Governance & Administration Identity Governance and Administration refers to the increasingly integrated Identity Lifecycle Management and Access Governance markets. Blog The Ping/ForgeRock combination A couple of months ago, the series of acquisitions of SailPoint, ForgeRock, and Ping Identity by Thoma Bravo triggered discussions and rumors about the impact on the broader Identity & Access Management (IAM) market. Recently, Thoma Bravo announced that ForgeRock would be combined into Ping Video Why You Shouldn’t Just Use IGA for Third Party Access Management Anirudh Sen, VP Products at Saviynt joins Nitish Deshpande, Research Analyst at KuppingerCole Analysts to explore the realm of Third Party Access Governance and its key distinctions from Identity Governance and Administration (IGA). Discover the evolving landscape of corporate Access Governance, Most recent in Passwordless Authentication Open Select Passwordless Authentication Create a shortlist of solutions tailored to your passwordless authentication needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors directly. Event Recording Is the future really password-free and is it worth using a PAM solution? Comprehensive protection of networks, system infrastructures, hardware and software, applications and data is part of every cyber security strategy. But what does this actually mean for identity and access management? Unloved for many years and repeatedly declared dead: passwords. Large IT Whitepaper How to Implement a Zero Trust Security Model With TrustBuilder’s Adaptive Authentication and Fine-Grained Authorization Every organization, regardless of size or industry, needs an agile and modern Identity and Access Management (IAM) platform. As the cybersecurity threat landscape continues to evolve, so do the requirements for IAM. Managing identities and access is essential to ensure that only the right people Most recent in Privileged Access Management Open Select Privileged Access Management Create a shortlist of solutions tailored to privileged access management your needs and compare them directly. View solution detailed ratings, demo videos, analyst interviews and contact vendors directly. Event Recording Is the future really password-free and is it worth using a PAM solution? Comprehensive protection of networks, system infrastructures, hardware and software, applications and data is part of every cyber security strategy. But what does this actually mean for identity and access management? Unloved for many years and repeatedly declared dead: passwords. Large IT Executive View NRI Secure Uni-ID Libra 2.7 Consumer Identity and Access Management (CIAM) continues to be a growing market year over year, offering a better user experience for the consumer and new challenges for the organization. With a focus on the Japanese market, the updated NRI Secure’s Uni-ID Libra v2.7 continues to provide innovative Most recent in Zero Trust Event Recording Chain of Confidence: Ensuring Trustworthiness in Software Supply Chains Paul Fisher delves into the multifaceted approach required to foster trustworthiness within complex software supply chains. This discussion begins by delineating the critical components of software supply chains and the potential risks associated with each link—from development and Whitepaper How to Implement a Zero Trust Security Model With TrustBuilder’s Adaptive Authentication and Fine-Grained Authorization Every organization, regardless of size or industry, needs an agile and modern Identity and Access Management (IAM) platform. As the cybersecurity threat landscape continues to evolve, so do the requirements for IAM. Managing identities and access is essential to ensure that only the right people Blog Securing the Digital Universe: Where Do We Even Start? What a huge topic. The Digital Universe. Is this more than the Metaverse or less? Anyway: We live in the Digital Age. The vast majority of organizations rely on digital services to run at least parts of their business. Every one of us is consuming such digital services. They are ubiquitous. But Research Leadership Compass Whitepaper Executive View Advisory Note Leadership Brief Blog Videos See all research Most recent in Leadership Compass Nov 08, 2023 Cloud Infrastructure Entitlement Management (CIEM) This Leadership Compass provides an overview and insights into the Cloud Infrastructure Entitlement Management (CIEM) market, with the aim of helping your organization find the right products and technologies for a successful CIEM deployment. Oct 23, 2023 API Security & Management This Leadership Compass provides an overview of the market for API security and management solutions, along with recommendations and guidance for finding the products which address your requirements most efficiently. We examine the complexity and breadth of the challenges to discover, monitor, and Sep 18, 2023 Attack Surface Management This report provides an overview of the Attack Surface Management market and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to providing Attack Most recent in Whitepaper Nov 13, 2023 How to Implement a Zero Trust Security Model With TrustBuilder’s Adaptive Authentication and Fine-Grained Authorization Every organization, regardless of size or industry, needs an agile and modern Identity and Access Management (IAM) platform. As the cybersecurity threat landscape continues to evolve, so do the requirements for IAM. Managing identities and access is essential to ensure that only the right people Aug 31, 2023 A Shift Toward MSP Delivery: How MSPs Are Mitigating Enterprise IAM Delivery Challenges Organizations face challenges in enterprise IAM delivery, including a shortage of experts, budget constraints, and difficulties in keeping up with industry changes. Fluctuations in IAM engagement lead to stress and reduced productivity. Insufficient transparency and prioritization cause financial Jul 19, 2023 Speeding up Zero Trust Delivery using Managed Services Zero Trust is important as a fundamental and essential paradigm for a stronger cybersecurity posture. Zero Trust, on the other hand, is complex to put in practice. For succeeding with the Zero Trust journey, leadership and an organization that is working hand in hand are essential, but also the Most recent in Executive View Oct 25, 2023 ReliaQuest GreyMatter Dieser Executive View Report von KuppingerCole befasst sich mit den Herausforderungen im Bereich der Cybersicherheit und den Optionen, die den Sicherheitsverantwortlichen für Managed Security Services in Form von MDR (Managed Detection and Response) zur Verfügung stehen. Der Report enthält eine Oct 16, 2023 Invisily Zero Trust Network Access Invisily is a Zero Trust Network Access platform that supports a broad range of deployment scenarios without the technical debt of existing competing solutions. It offers several unique capabilities such as sophisticated device inventory and posture checks, agentless and embeddable connectivity, Oct 10, 2023 ForgeRock Workforce Identity Governance This KuppingerCole Executive View report looks at the ForgeRock Workforce Identity Governance solution, which combines enterprise identity governance with access management to manage the complete identity lifecycle within a single platform. Most recent in Advisory Note Oct 30, 2023 How Enterprises Will Learn to Love Decentralized IDs: The Roles of Distributed and Sovereign Identities in Our Private Metaverse Recently, Meta CEO Mark Zuckerberg demonstrated in captivating detail a working beta version of photorealistic—or rather, video realistic—avatars in the metaverse. Zuckerberg also claims that this technology will begin rolling out this year (2023) and will be at a consumer price point by the end of Sep 22, 2023 Architecting Your SOC to Defend Against Today's Attack Vectors Organizations must prioritize architecting a modern Security Operations Center (SOC) as it is becoming more critical for strengthening their cybersecurity defenses against sophisticated cyber threats. A modern SOC enables proactive threat detection, rapid incident response, and cyber resilience by Sep 04, 2023 EU Digital Operational Resilience Act (DORA) Operational resilience is essential for every organization embracing digital transformation to ensure that all business IT systems are able to resist and recover from any type of disruption, including cyberattacks. The European Union has put together a framework of requirements in the Digital Most recent in Leadership Brief Nov 04, 2022 Why Vulnerability Management Is a Strategic Investment Considering that the threat landscape is constantly changing, it is important to maintain a strong cybersecurity foundation. Organizations need security hygiene standards to increase security and readiness while preventing vulnerabilities from being exploited by adversaries. By introducing a Aug 30, 2022 Managing RDP Security Risks to Block Ransomware Attacks Remote working is becoming widespread for social and economic reasons, and one of the key enablers is the Remote Desktop Protocol (RDP). However, RDP is one of the most popular initial cyber-attack vectors, which is all too often overlooked. This leadership brief details the security risks Aug 09, 2022 Advanced IT security solutions for OT environments Industrial Control Systems operators are increasingly targeted by Advanced Persistent Threat (APT) actors and cybercriminals as digital transformation accelerates. Many hitherto isolated systems now connected, which introduces additional risks from enterprise IT and the cloud. Although such Most recent in Blog Nov 28, 2023 Challenging the Easy Path: Why NIS2 Demands a New Compliance Mindset The enforcement of NIS2 is marked by firm oversight and significant sanctioning power. Supervisory bodies are designated at the national level to monitor and enforce compliance. Nov 08, 2023 The Bletchley Declaration: The Imitation Game of a Different Kind Last week, the United Kingdom hosted the AI Safety Summit, the first ever international conference on the safety and regulation of artificial intelligence. With attendees from over 30 governments and international organizations, it represented the beginning of long-term international cooperation on Nov 07, 2023 Foresight Consulting in Cybersecurity Cybersecurity professionals sometimes must predict the future to be able to know what to do in the present. With SAFIRE scenarios they can get a real edge over cyber criminals. Most recent in Videos Nov 27, 2023 Analyst Chat #196: AIdentity - The Crucial Link Between AI and Identity In this episode, Matthias and Martin explore the evolving role of AIs in business processes. AIs are becoming significant actors, representing human identities in tools like chatbots and even functioning autonomously. Martin underscores the importance of traceability, access management, and the Nov 24, 2023 Are You Prepared for the True AD Disaster? In this webinar, we will look at Disaster Recovery planned right and done right – preparation is key to success The central role of directory services for the entire IT Events triggering the need for directory services DR Planning for directory services / Microsoft AD DR: How Nov 17, 2023 cyberevolution Wrap-Up Events EIC 2024 cyberevolution Webinars See past events European Identity and Cloud Conference 2024 Join the iconic identity community from June 4 - 7, 2024 in Berlin, Germany! Get the Prime Discount and register for 1,000 EUR! To the Event Call for Speakers cyberevolution Attend cyberevolution in Germany and meet 500 security experts from Nov 14 - 16, 2023. Participate in interactive sessions to explore cybersecurity in an AI powered digital world. Network with an international community and learn about societal, technological, and environmental megatrends. To the Event Agenda Overview Most recent in Webinars Nov 29, 2023 The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions In the high-stakes world of financial institutions, safeguarding sensitive data is paramount. The enemy, however, may lurk within. Join us for an eye-opening webinar as we delve deep into the world of insider threats, their definitions, types, and most importantly, how to protect your institution Nov 30, 2023 Supercharge Your Access Control Capabilities With a New Approach Are you ready to revolutionize your understanding of Access Control? We invite you to a game-changing webinar that will illuminate the vital distinctions between policy-based, attribute-based, and role-based access control – the three pillars of modern access control. Prepare to embark on a journey Dec 05, 2023 Navigating the Access Control Maze This KuppingerCole webinar offers a comprehensive exploration of access control challenges, the limitations of traditional RBAC and PBAC, some innovative policy-driven solutions, a demonstration of policy-driven RBAC in MidPoint, and actionable insights for enhancing access control strategies. Advisory Advisory Services KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges. See Advisory Services Contact our advisors E-mail info@kuppingercole.com Phone +49 (211) 2370 77-0 Meet our Advisors KC Open Select Managed Detection and Response Data Leakage Prevention Unified Endpoint Management Fraud Reduction Intelligence Platforms Identity Governance & Administration Customer Identity and Access Management Privileged Access Management Passwordless Authentication Discover and compare cybersecurity solutions Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company. Visit KC Open Select Contact KuppingerCole E-mail info@kuppingercole.com Phone +49 (211) 2370 77-0 Contact Us Company About us People Jobs Newsroom Cybersecurity Council Contact us Discover Our Passion for Advancing Identity and Security We are specialized in the strategic management of digital identities, privileges, authentication, and access control as well as cybersecurity and business resilience. Read more about our philosophy Analysts & Advisors Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals. Business Team Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible. Meet the Team Career Opportunities Events Wiesbaden Auszubildende/r zum Veranstaltungskaufmann/-frau (m/w/d) Die KuppingerCole Analysts AG ist ein IT-Analystenunternehmen mit Hauptsitz in Wiesbaden und weiteren Standorten rund um die Welt. Insgesamt beschäftigen wir aktuell rund 50 Mitarbeiter. KuppingerCole unterstützt seine Kunden mit Leistungen in den Bereichen Events, Advisory und Research. View all Job Offers Latest Press Releases Press Release November 23, 2023 KuppingerCole Analysts’ cyberevolution 2023 Conference Connects over 700 International Cybersecurity Experts in Frankfurt The cyberevolution 2023 conference, hosted by KuppingerCole Analysts at the Frankfurt Kap Europa from November 14 to 16, has successfully concluded, marking a new era in the exchange of cybersecurity knowledge and practices. Press Release August 08, 2023 Mike Neuenschwander Joins KuppingerCole Analysts, Inc. as Vice President KuppingerCole Analysts AG, a leading global analyst firm providing expertise in Identity & Access Management (IAM) and Cybersecurity, is delighted to announce the appointment of Mike Neuenschwander as Global Head of Research Strategy and Vice President of the company’s US business arm. Press Release August 02, 2023 KuppingerCole Analysts AG Achieves TISAX Assurance Level 3 and ISO 27001 Certifications KuppingerCole Analysts AG, a leading IT analyst company, is delighted to announce that it has achieved two critical milestones in the field of information security: TISAX Assessment Level 3 (AL3) and ISO 27001 certifications. Cybersecurity Council With the Cybersecurity Council, we bring together world-class information security professionals in leading positions from across many industries and schools of thought to exchange and discuss how to secure the rapidly growing cyber economy. The results of these fruitful discussions will flow into every of our services. Learn more Basic contact information KuppingerCole Analysts AG Wilhelmstr. 20-22 65185 Wiesbaden Germany E-mail Phone info@kuppingercole.com +49 (211) 2370 77-0 See all locations, phone numbers, e-mail addresses Webinars Upcoming Webinar Share Twitter Facebook LinkedIn Copy URL Save BOOKMARKS Save your favorite items in your personal watch list so that you can read them later and find them again easily. Login Don't have a KC account yet? Join Now MASTERING GLOBAL IAM FOR CYBERSECURITY EXCELLENCE: FROM ZERO TRUST PRINCIPLES TO IDENTITY THREAT DETECTION & RESPONSE (ITDR) December 07, 2023 4:00pm CET, 10:00am EST, 7:00am PST Register now Join this webinar to learn about * Complex Digital Transformations: As organizations transition to digital platforms and embrace cloud technologies, the webinar will provide insights into how to navigate the complexities of identity management for a safer and more efficient digital transformation. * Missing Holistic Security Concept: Learn how to seamlessly integrate SaaS services into your security landscape while safeguarding critical assets in the cloud. * Integration of Legacy Systems: Understand the challenges posed by legacy systems and discover strategies for their seamless integration with modern IAM solutions, eliminating potential security vulnerabilities. * Decentralized Work Environments: With the rise of remote work, we'll discuss strategies for ensuring secure access to company resources from diverse locations and devices, enabling you to adapt to the changing work environment securely. * Zero Trust Implementation: While the Zero Trust model is widely advocated, it can be intricate to implement. We will provide insights into the fundamental shifts required in organizational security strategies to successfully implement the Zero Trust approach. Why Is IAM So Essential for Strengthening Detection and Response to Cyber-Attacks? In today's interconnected global landscape, the role of Identity and Access Management (IAM) has never been more crucial in shaping cybersecurity strategies. As businesses expand across borders, the demand for robust authentication and authorization mechanisms is at an all-time high. Join us in this insightful webinar as we delve into the world of global IAM, exploring key concepts, challenges, and solutions that will empower you to take your cybersecurity to the next level. Speaker's Contributions Paul Fisher, Lead Analyst at KuppingerCole Analysts, will look at the requirements and market for ITDR and the role it plays in the Zero Trust context, but also its relationship to other DR technologies. Andre Priebe, Chief Technology Officer at iC Consult, will share his knowledge and experiences to help you enhance your cybersecurity strategy, tackle global challenges, and stay ahead in the ever-evolving world of cybersecurity. Webinar Mastering Global IAM for Cybersecurity Excellence: From Zero Trust Principles to Identity Threat Detection & Response (ITDR) Register now Speakers Lead Analyst KuppingerCole Paul Fisher Paul Fisher is a Lead Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry sectors including automotive. Paul is responsible for managing relevant quantitative research at... View profile Chief Technology Officer iC Consult Group GmbH Andre Priebe Andre Priebe is Chief Technology Officer of the iC Consult Group, a vendor-independent system integrator specialized in Identity & Access Management with more than 500 employees around the globe. With over 15 years of experience in managing IAM projects focussing on workforce, customer, and... View profile Lead Sponsor FAQ Why should I register for a KuppingerCole webinar? Join this combined presentation to gain quick insights and hands-on solutions from a KuppingerCole analyst and selected industry expert, finishing with by a comprehensive Q&A for your individual business challenges. How can I register for this webinar? To register for the webinar, you need to log in to your KuppingerCole account first. If you do not have an account yet, you can sign up here. After logging in, please enter your requested personal data which is necessary for the further administration of your registration. Once registered, a booking confirmation will be sent to your indicated e-mail address. How long does the webinar last? Our webinars last approximately 50-60 minutes. I did not receive a booking confirmation. What can I do? If you didn’t receive the booking confirmation in your inbox, please check your spam folder. If you cannot find the booking confirmation in your spam folder, please contact us. We will get back to you within one business day. What technical equipment do I need? To participate, you need a computer or a laptop with Internet access. If you want to use the sound transmission via the computer, you will need headphones (headset) or speakers. You do not need a webcam or microphone. You can type in questions in the chat window. In the registration confirmation you will also receive a link that allows you to test the technical requirements in advance. What does it cost to attend? Our webinars are generally free of charge. When will the recordings and presentation slides be available? Will I get notified? How can I access them? The recordings and presentation slides will be available on the website shortly after the webinar. An e-mail will be sent to all registered users. In order to access the materials, you will need to log in first. I registered for the webinar, but unfortunately I was not able to attend live. Do I still get access to the recordings and presentation slides? Yes, the recordings and presentation slides are made available to all users that registered for the webinar, regardless if they attended live or were tied up with business. See also Webinars Hybrid Events Virtual Events Insights Customer Identity & Access Management Decentralized Identity Fraud Prevention Identity & Access Management Identity Governance and Administration Passwordless Authentication Privileged Access Management Zero Trust Research Leadership Compass Whitepaper Executive View Advisory Note Leadership Brief Blog Videos Advisory Advisory Services Meet our Advisors Events EIC 2024 cyberevolution Webinars KC Open Select Managed Detection and Response Data Leakage Prevention Unified Endpoint Management Fraud Reduction Intelligence Platforms Identity Governance & Administration Customer Identity and Access Management Privileged Access Management Passwordless Authentication Company About us People Jobs Newsroom Cybersecurity Council Contact us Insights Customer Identity & Access Management Decentralized Identity Fraud Prevention Identity & Access Management Identity Governance and Administration Passwordless Authentication Privileged Access Management Zero Trust Research Leadership Compass Whitepaper Executive View Advisory Note Leadership Brief Blog Videos Advisory Advisory Services Meet our Advisors Events EIC 2024 cyberevolution Webinars KC Open Select Managed Detection and Response Data Leakage Prevention Unified Endpoint Management Fraud Reduction Intelligence Platforms Identity Governance & Administration Customer Identity and Access Management Privileged Access Management Passwordless Authentication Company About us People Jobs Newsroom Cybersecurity Council Contact us Switch to dark theme Switch to light theme Imprint Terms & Conditions Terms of Use Privacy Policy © Copyright KuppingerCole Analysts AG © Copyright KuppingerCole Analysts AG Go to Market with KuppingerCole WE VALUE YOUR PRIVACY This website uses cookies to personalize content, to provide social media features, and to analyze traffic. You have the right to consent to essential services only and to modify or revoke your consent at a later time in the privacy policy.Privacy Policy Cookie Settings Reject All Cookies Accept All Cookies PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button PERFORMANCE COOKIES Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Confirm My Choices